Skip to main content
guest
Join | Help | Sign In
ITGS-mx Home
guest| Join | Help | Sign In
  • Wiki Home
  • Projects
  • Recent Changes
  • Pages and Files
  • Members
  • Discussion
ITGS-mx

Home

Strand 1: Social and ethical significance

1.1 Reliability and integrity
1.2 Security
1.3 Privacy and anonymity
1.4 Intellectual Property
1.5 Authenticity
1.6 Digital divide and equality of access
1.7 Surveillance
1.8 Globalization and cultural diversity
1.9 Policies
1.10 Standards and protocols
1.11 People and machines
1.12 Digital citizenship

Strand 2: Application to specified scenarios

2.1 Business and Employment
2.2 Education and Training
2.3 Environment
2.4 Health
2.5 Home and Leisure
2.6 Politics and government

Strand 3: IT Systems

3.1 - Hardware
3.2 - Software
3.3 - Networks
3.4 - Internet
3.5 - Personal and Public Communications
3.6 - Multimedia and Digital Media
3.7 - Databases
3.8 - Spreadsheets, modelling and simulations
3.9 - Introduction to project management

HL Extension
3.10 - IT systems in organizations
3.11 - Robotics, artificial intelligence and expert systems
3.12 - Case Study 2012
3.13 - 4 elements analysis


Extra Topics and important information.

4.1 Command Terms
4.3 Campus Party
4.2 Mock Questions
4.4 EXAM 1
4.5 CES 2011
4.6 Review Championship

Project
5.1 Paper 1 Database Question (Team 1)


Teachers
6.1 Teaching Resources

Favorites 
20
All Pages
20
Menu
20

Networks

Edit 24 …
  • 1 Tags
    • network security privacy anonymity
  • Notify
  • RSS
  • Backlinks
  • Source
  • Print
  • Export (PDF)
This is the first Unit we are covering from the ITGS syllabus. The main subtopics to cover are:
  1. What is a network? Uses of a network
  2. Network equipment
    1. Types of cables.
    2. Firewalls
    3. NIC's
    4. Routers
    5. Switches / Hubs
    6. Servers / Clients
  3. Types of networks
    1. Intranets / Extranets
    2. WAN, LAN, WLAN
    3. VPNs
  4. Wireless networks
    1. How WiFi Networks Work
    2. Types of Wireless connections
    3. Acess Points
    4. WiFi NICs
    5. War Driving
  5. Security issues
    1. Viruses
    2. Antiviruses
    3. Spyware
    4. Trojans
    5. Worms
    6. Scareware
    7. Botnets
    8. Keyloggers
    9. Phishing
    10. Pharming
    11. Brute Force Attack
    12. Denial of Service Attack
    13. Rainbow Tables
    14. Hackers and crackers
    15. Wireless security protocol (WEP).
    16. WPA
  6. Authentication and its purpouse in networks
    1. Login
    2. Username and password
    3. Robery of identities
  7. Encryption
    1. What is Encryption
    2. Encryption methods
    3. Public Key method
  8. E-commerce (the use of networks in the business area of impact)
    1. What is e-commerce
    2. B2B
    3. B2C
    4. B2E
    5. C2C
    6. Payment Systems

This are the Wikinotebook elements for this topic:

  • Key Terms

  • News Items

  • Areas of Impact Analysis

  • Diagrams

  • Exam Questions

  • Readings summaries

help on how to format text

Help · About · Pricing · Privacy · Terms · Support · Upgrade
Contributions to https://itgs-mx.wikispaces.com/ are licensed under a Creative Commons Attribution Share-Alike 3.0 License. Creative Commons Attribution Share-Alike 3.0 License
Portions not contributed by visitors are Copyright 2018 Tangient LLC
TES: The largest network of teachers in the world
Turn off "Getting Started"
  1. Home
  2. ...
Loading...